Static task
static1
Behavioral task
behavioral1
Sample
d7d0743818f8d4b52627716eee6b5e0a12b0aaa6fc9bf58885afce985a651cb6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7d0743818f8d4b52627716eee6b5e0a12b0aaa6fc9bf58885afce985a651cb6.exe
Resource
win10v2004-20220812-en
General
-
Target
d7d0743818f8d4b52627716eee6b5e0a12b0aaa6fc9bf58885afce985a651cb6
-
Size
408KB
-
MD5
43f5648736dfbbec9e7e5c740f1a5d2c
-
SHA1
fcbe187daf1a22c8d276d3ffde240ce49f1c9c18
-
SHA256
d7d0743818f8d4b52627716eee6b5e0a12b0aaa6fc9bf58885afce985a651cb6
-
SHA512
a4dcd2631993845d83a9786d837df684cf985d38f2e78912d40070721659afacbfaa43e1909d094642137a22ddb10aa084239ce104659c0a34a8711b24475e40
-
SSDEEP
6144:fNsd5DpVm3gSp54ycocis0MBfE1RUDwlYR9ZKfx7l7oftDaM1TPM:fNsHFVm3Jo0gfE1RUDwly9g7oftDPT
Malware Config
Signatures
Files
-
d7d0743818f8d4b52627716eee6b5e0a12b0aaa6fc9bf58885afce985a651cb6.exe windows x86
a5225e4c30dd231711e4f54b0e616f2b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
RtlUnwind
HeapFree
HeapAlloc
ExitProcess
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetProcessHeap
GetStartupInfoA
RaiseException
ExitThread
CreateThread
HeapSize
GetACP
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetCurrentDirectoryA
HeapCreate
VirtualFree
Sleep
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GlobalFlags
GetFileTime
SetErrorMode
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
TlsGetValue
LocalAlloc
InterlockedDecrement
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
GetVersionExA
GetModuleHandleA
FreeResource
GetProcAddress
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
LoadLibraryA
MoveFileA
CreateEventA
SuspendThread
SetEvent
GetCurrentThreadId
ResumeThread
SetThreadPriority
CloseHandle
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
GetCurrentProcessId
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
SetLastError
lstrlenA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
RemoveDirectoryA
GetCommandLineA
GetLongPathNameA
GetSystemDirectoryA
GetLastError
FormatMessageA
LocalFree
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
CreateDirectoryA
lstrcpynA
MultiByteToWideChar
WaitForSingleObject
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesA
CopyFileA
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
HeapDestroy
SizeofResource
user32
RegisterClipboardFormatA
PostThreadMessageA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
DestroyMenu
SetWindowContextHelpId
MapDialogRect
SetCursor
PostQuitMessage
WindowFromPoint
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
UpdateWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowTextLengthA
GetFocus
SetWindowPos
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SendMessageA
SetTimer
KillTimer
EnableWindow
PtInRect
SendDlgItemMessageA
GetWindow
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
UnregisterClassA
IsWindowVisible
GetKeyState
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
IsRectEmpty
CopyAcceleratorTableA
CharNextA
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
LoadIconA
GetSystemMetrics
CharUpperA
DrawStateA
CopyRect
SetRect
InflateRect
FillRect
InvalidateRect
GetWindowTextA
DrawFocusRect
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
MessageBoxA
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
GetWindowThreadProcessId
ValidateRect
GetCursorPos
PeekMessageA
gdi32
CreateBitmap
GetStockObject
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
CreateSolidBrush
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
MoveToEx
LineTo
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
RoundRect
CreatePen
GetTextExtentPoint32A
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
CryptReleaseContext
RegCloseKey
CryptDecrypt
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDestroyHash
CryptEncrypt
CryptDestroyKey
shell32
ShellExecuteA
SHChangeNotify
DragFinish
DragQueryFileA
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteExA
comctl32
_TrackMouseEvent
shlwapi
PathFileExistsA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
PathIsDirectoryA
PathFindFileNameA
oledlg
ord8
ole32
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
OleFlushClipboard
OleIsCurrentClipboard
CoRegisterMessageFilter
CLSIDFromString
oleaut32
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SysAllocString
Sections
.text Size: 272KB - Virtual size: 271KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE